10.08.2013 Views

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2.1.1 Mapping the cybercrime value chain<br />

Most cybercrime attacks <strong>of</strong> credit card and identity fraud share the need to go<br />

through three basic activities: detecting vulnerabilities, infection and<br />

distribution, and exploitation.<br />

Cybercrime has moved away from the fragmented activities <strong>of</strong> a few isolated<br />

programmers and is increasingly mimicking corporate business. The fraudsters seem to<br />

have defined roles and specialities and a clear division <strong>of</strong> labour. This applies to<br />

everything from ATM skimming to phishing and hacking. The actors involved in these<br />

crimes have specific means <strong>of</strong> communications, rules <strong>of</strong> engagement and even ethics.<br />

They coordinate their actions to gain competitive advantage – over the system they are<br />

attacking rather than from rival groups, given that the gains are so plentiful – and target<br />

a specific segment <strong>of</strong> the market.<br />

Each <strong>of</strong> these activities is intended to support the undetected generation <strong>of</strong> financial<br />

pr<strong>of</strong>it. Therefore, each activity can be associated with multiple methods <strong>of</strong> achieving a<br />

financial reward (or business models as explained below), with their own sources <strong>of</strong><br />

competitive advantage and associated gains or value added, combining with each other<br />

to form a value chain. Cybercrime can thus be seen as a whole value chain facilitating<br />

fraud, with different operations, pr<strong>of</strong>it margins, technological capabilities and innovation<br />

opportunities attached to each stage.<br />

Cybercrime attacks resulting in identity theft and credit card fraud generally share the<br />

need to go through three basic activities. Various actors can perform these actions,<br />

either collectively or individually. The increasing trend towards specialisation is rapidly<br />

differentiating the tasks, which has improved the efficiency <strong>of</strong> each activity and<br />

subsequently the efficiency <strong>of</strong> the whole industry. The cybercrime value chain is<br />

represented in figure 8.<br />

Page 42

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!